Disk encryption

USB flash drive security

Secure USB flash drives protect the data stored on them from access by unauthorized users. USB flash drive products have been on the market since 2000, and their use is increasing exponentially. As both consumers and businesses have increased demand for these drives, manufacturers are producing faster devices with greater data storage capacities. An increasing number of portable devices are used in business, such as laptops, notebooks, personal digital assistants (PDA), smartphones, USB flash drives and other mobile devices. Companies in particular are at risk when sensitive data are stored on unsecured USB flash drives by employees who use the devices to transport data outside the office. The consequences of losing drives loaded with such information can be significant, including the loss of customer data, financial information, business plans and other confidential information, with the associated risk of reputation damage. (Wikipedia).

Video thumbnail

How to Use a USB Drive

A USB drive is a small, removable hard drive that plugs into a USB port on your computer. To learn more about USB Drives visit: https://edu.gcfglobal.org/en/computerbasics/bringing-your-files-with-you/1/ We hope you enjoy!

From playlist Computer Basics

Video thumbnail

How can I keep all my smart devices secure?

Keep those programmable “smart” devices like toasters and light bulbs around your home from being coopted for nefarious activities by choosing and maintaining devices with security in mind.

From playlist Internet Safety

Video thumbnail

What do we mean by device security? Why should we care about this?

Keep your smart devices safe! Learn what device security is, and how it protects your phones, tablets, and computers from being accessed and exploited by cybercriminals.

From playlist Internet Safety

Video thumbnail

What can I do to protect my devices?

Be proactive about protecting your devices by taking advantage of the device manufacturer’s security updates and only downloading apps and files from reputable sources.

From playlist Internet Safety

Video thumbnail

Network Security, Part 1 : Basic Encryption Techniques

Fundamental concepts of network security are discussed. It provides a good overview of secret Key and public key Encryption. Important data encryption standards are presented.

From playlist Network Security

Video thumbnail

#177 Avoid Surprises: How good are USB cables and how can you test yours?

Are my USB cables any good? Or will they vaporize if used? I will answer this questions for my cables and you will learn how to test yours (tutorial) to avoid surprises in the future. We use USB cables for many of our projects and other devices like smartphones. Sometimes our projects do

From playlist ESP32

Video thumbnail

Intrusion Detection: Part 2

Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.

From playlist Network Security

Video thumbnail

Become Anonymous & Untraceable | How To Securely Install & Use Tails | Tor Tutorial

Tails - The Amnesic Incognito Live System, is the most anonymous operating system in the world. Edward Snowden used to leak the NSA documents. Here's how you can get it too. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqB

From playlist TUTORIALS & HOW TO's

Video thumbnail

DEFCON 20: Bypassing Endpoint Security for $20 or Less

Speaker: PHIL POLSTRA COMPUTER SECURITY PROFESSOR, UNIVERSITY OF DUBUQUE In this talk cheap easily constructed devices which can be used to bypass endpoint security software by making any USB mass storage (flash or hard) drive appear as authorized devices will be presented. The design a

From playlist DEFCON 20

Video thumbnail

26C3: Lightning Talks - Day 4 1/15

Clip 1/15 Speakers: Oliver Pritzkow, Sven Guckes 4 minutes of fame 4 minutes for every speaker. Learn about the good, the bad, and the ugly - in software, hardware, projects, and more. For more information go to: http://events.ccc.de/congress/2009/Fahrplan/events/3645.en.html

From playlist 26C3: Here be dragons day 4

Video thumbnail

Embedded Recipes 2018 - WooKey: the USB Battlefront Warrior - Mathieu Renard, Ryad Benadjila

USB devices are nowadays ubiquitous and participate to a wide variety of use cases. Recent studies have exposed vulnerabilities on the USB implementations, and among them the BadUSB attacks are a serious threat against the integrity of USB devices. Firmwares, hosts Operating Systems, as we

From playlist Embedded Recipes 2018

Video thumbnail

Linux Bootable USB Drive

More videos like this online at http://www.theurbanpenguin.com Adding an ISO to a USB and making it bootable. We do this on a Windows & host and endure we do not hit syslinux issues by partitioning the USB drive properly with diskpart.

From playlist LPI Linux Essentials

Video thumbnail

ShmooCon 2011: USB Autorun attacks against Linux

Speaker: Jon Larimer Many people think that Linux is immune to the type of Autorun attacks that have plagued Windows systems with malware over the years. However, there have been many advances in the usability of Linux as a desktop OS - including the addition of features that can allow Au

From playlist ShmooCon 2011

Video thumbnail

Hardware Hacking 101: Rogue Keyboards and Spy Cables

This is a live tutorial of hacking with keystroke injection attacks. We take advantage of the inherent trust that computers place on what is believed to be a regular keyboard to unleash pre-programmed keystroke payloads at well over 1000 words a minute. We access the host system and bypass

From playlist IoT

Video thumbnail

22C3: "Xbox" and "Xbox 360" Hacking

Speakers: Felix Domke, Michael Steil 17 Mistakes Microsoft Made in the Xbox Security System & Xbox 360 Hacking A lot about Xbox hacking has been published earlier. This talk summarizes all this, explains some very cool new hacks and analyzes the 15 mistakes Microsoft made in the Xbox sec

From playlist 22C3: Private Investigations

Video thumbnail

DEFCON 18: Katana: Portable Multi-Boot Security Suite 1/3

Speaker: JP Dunnin Tired of keeping up with dozens of CDs and flash drives loaded with various Live operating systems and applications? I will be introducing the Katana: Portable Multi-Boot Security Suite; which brings many of the best live operating systems and portable applications to

From playlist DEFCON 18-2

Video thumbnail

DEFCON 18: Katana: Portable Multi-Boot Security Suite 2/3

Speaker: JP Dunnin Tired of keeping up with dozens of CDs and flash drives loaded with various Live operating systems and applications? I will be introducing the Katana: Portable Multi-Boot Security Suite; which brings many of the best live operating systems and portable applications to

From playlist DEFCON 18-2

Video thumbnail

Computer Basics: Protecting Your Computer

There are many different online threats that you need to be aware of. In this video, we're going to show you some of these threats and talk about how to protect the files and personal data that you have stored on your computer. We hope you enjoy! For more info, check out our written less

From playlist Starting out with Technology

Video thumbnail

You Should Make A Digital Bugout Bag

Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone International Red Cross recommends that all persons have an emergency survival kit with multiday supplies of the most essential items. This is in case of any natural or man-made cri

From playlist TUTORIALS & HOW TO's

Related pages

Duqu | BitLocker | Stuxnet | Cold boot attack | VeraCrypt | Flame (malware)